{"id":18337,"date":"2025-02-11T16:02:05","date_gmt":"2025-02-11T15:02:05","guid":{"rendered":"https:\/\/www.uni.lu\/fdef-en\/?post_type=events&#038;p=18337"},"modified":"2025-09-24T11:21:52","modified_gmt":"2025-09-24T09:21:52","slug":"phish-and-chips-lunchtime-lectures-on-cybersecurity-1","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/","title":{"rendered":"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace"},"content":{"rendered":"\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/www.eventbrite.com\/e\/lecture-series-in-cyber-policy-tickets-1244525712909?aff=oddtdtcreator\"\n                target=\"_blank\"\n        class=\"btn btn--primary\"\n            >Register<\/a>\n<\/li>\n\n\n<li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/calendar\"\n                target=\"_self\"\n        class=\"btn btn--secondary\"\n            >Add to calendar<\/a>\n<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-sm\"><\/div>\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"abstract\"\n    >\n<strong>Abstract<\/strong><\/h5>\n\n\n\n<p>Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace&#8217;s flexible and adaptable nature as a human-made domain and social technology. This talk will focus on how and why <strong>cyberspace has evolved from a fifth domain of warfare to a tool for sub-threshold destabilization, and finally to a resource in strategic competition<\/strong>. Without acknowledging the dynamic and context-dependent nature of how and when cyber capabilities are used, we cannot grasp their impact. We need to understand cyberspace not as an isolated domain or tool, but an <strong>integral and underlying condition embedded in increasingly digital societies<\/strong> if we want to understand how key actors adapt(ed) their use of cyber capabilities to changing strategic contexts.<\/p>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-sm\"><\/div>\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"about-the-speaker\"\n    >\nAbout the speaker<\/h5>\n\n\n\n<p><strong><a href=\"https:\/\/css.ethz.ch\/en\/center\/people\/dunn-cavelty-myriam.html\" target=\"_blank\" rel=\"noreferrer noopener\">Dr. Myriam Dunn Cavelty<\/a><\/strong> is Senior Scientist and Deputy for Research and Teaching at the Center for Security Studies (CSS) at ETH Zurich. <\/p>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-sm\"><\/div>\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"language\"\n    >\n<strong>Language<\/strong><\/h5>\n\n\n\n<p>English. <\/p>\n\n\n\n<p>This is a free hybrid event. Registration is mandatory.<\/p>\n\n\n\n<p>The event will run from 12.30 until 14.00. A cold lunch will be offered from 12.00.<\/p>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-sm\"><\/div>\n\n\n<ul class=\"wp-block-unilux-blocks-button-list-v2\">\n<li class=\"wp-block-unilux-blocks-button-list-item-v2\"><a class=\"quick-link\" href=\"https:\/\/www.uni.lu\/fdef-en\/chairs\/chair-in-cyber-policy\/\" target=\"\" role=\"link\" rel=\"noopener\" tabindex=\"0\"><span class=\"quick-link__container\">\n<div class=\"wp-block-unilux-blocks-block-inserter quick-link__img\">\n<div class=\"icon--primary icon--secondary-2 icon--xl wp-block-unilux-blocks-icon-picker\">\n    <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--research \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--research\"><\/use><\/svg><\/div><\/div>\n\n\n\n<span class=\"quick-link__name wp-block-unilux-blocks-plain-text\">Find out more about the Chair in Cyber Policy<\/span>\n\n<svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--external-link \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--external-link\"><\/use><\/svg><\/span><\/a><\/li>\n<\/ul>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":85,"featured_media":18340,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2025-03-07 12:00:00","event_end_date":"2025-03-07 14:00:00","event_speaker_name":"Dr. Myriam Dunn Cavelty","event_speaker_link":"","event_is_online":false,"event_location":"Weicker Building","event_street":"4, rue Alphonse Weicker","event_location_link":"https:\/\/www.uni.lu\/en\/about\/campuses\/weicker-building\/","event_zip_code":"2721","event_city":"Luxembourg","event_country":"Luxembourg"},"events-topic":[305],"events-type":[323,322,315,321],"organisation":[375,104,101],"authorship":[85],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace - FDEF events I Uni.lu<\/title>\n<meta name=\"description\" content=\"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace\" \/>\n<meta property=\"og:description\" content=\"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/\" \/>\n<meta property=\"og:site_name\" content=\"FDEF EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.FDEF.lu\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T09:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/\",\"url\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/\",\"name\":\"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace - FDEF events I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg\",\"datePublished\":\"2025-02-11T15:02:05+00:00\",\"dateModified\":\"2025-09-24T09:21:52+00:00\",\"description\":\"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace's\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg\",\"width\":2560,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faculty of Law, Economics and Finance\",\"item\":\"https:\/\/www.uni.lu\/fdef-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fdef-en\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/fdef-en\/\",\"name\":\"FDEF\",\"description\":\"Faculty of Law, Economics and Finance I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#organization\"},\"alternateName\":\"Faculty of Law, Economics and Finance I University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fdef-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#organization\",\"name\":\"FDEF - University of Luxembourg I Uni.lu\",\"alternateName\":\"Faculty of Law, Economics and Finance\",\"url\":\"https:\/\/www.uni.lu\/fdef-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2026\/03\/03111918\/FDEF_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2026\/03\/03111918\/FDEF_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"FDEF - University of Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fdef-en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/uni.FDEF.lu\",\"https:\/\/www.linkedin.com\/showcase\/fdef-uni-lu\/\"],\"description\":\"Faculty of Law, Economics and Finance I Uni.lu\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace - FDEF events I Uni.lu","description":"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/","og_locale":"en_GB","og_type":"article","og_title":"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace","og_description":"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace's","og_url":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/","og_site_name":"FDEF EN","article_publisher":"https:\/\/www.facebook.com\/uni.FDEF.lu","article_modified_time":"2025-09-24T09:21:52+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/","url":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/","name":"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace - FDEF events I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/fdef-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg","datePublished":"2025-02-11T15:02:05+00:00","dateModified":"2025-09-24T09:21:52+00:00","description":"Over the past three decades, state actors have used cyber means in various, often unexpected ways to achieve political goals. This reflects cyberspace's","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2025\/02\/AdobeStock_783739249-scaled.jpeg","width":2560,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fdef-en\/events\/phish-and-chips-lunchtime-lectures-on-cybersecurity-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Faculty of Law, Economics and Finance","item":"https:\/\/www.uni.lu\/fdef-en\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/fdef-en\/events\/"},{"@type":"ListItem","position":4,"name":"Phish and Chips: From Domain to Resource: The Evolving Strategic Role of Cyberspace"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fdef-en\/#website","url":"https:\/\/www.uni.lu\/fdef-en\/","name":"FDEF","description":"Faculty of Law, Economics and Finance I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/fdef-en\/#organization"},"alternateName":"Faculty of Law, Economics and Finance I University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fdef-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fdef-en\/#organization","name":"FDEF - University of Luxembourg I Uni.lu","alternateName":"Faculty of Law, Economics and Finance","url":"https:\/\/www.uni.lu\/fdef-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fdef-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2026\/03\/03111918\/FDEF_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/3\/2026\/03\/03111918\/FDEF_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"FDEF - University of Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/fdef-en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uni.FDEF.lu","https:\/\/www.linkedin.com\/showcase\/fdef-uni-lu\/"],"description":"Faculty of Law, Economics and Finance I Uni.lu"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events\/18337"}],"collection":[{"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/types\/events"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/comments?post=18337"}],"version-history":[{"count":5,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events\/18337\/revisions"}],"predecessor-version":[{"id":21412,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events\/18337\/revisions\/21412"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/users\/85"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/media\/18340"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/media?parent=18337"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events-topic?post=18337"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/events-type?post=18337"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fdef-en\/wp-json\/wp\/v2\/organisation?post=18337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}